Sunteți pe pagina 1din 3

CIO Guide: Why Switch to a Hybrid SOC

In todays heightened threat environment, IT


leaders must find creative ways to leverage their
resources and better defend against advanced
cyber attacks.
Balancing the cost of IT security operations vs. the
risk of a security breach is one of the toughest
challenges facing IT leadership. CIOs and CISOs
are seldom thanked when nothing bad happens and,
despite making their best efforts within a limited
budget, usually blamed when a security incident does
occur.

Hybrid SOC
Modern enterprises can generate hundreds of
millions of security events every day and these events
must be collected and analyzed around-the-clock
to detect actual or pending attacks. Conventionally,
organizations have staffed Security Operations
Centers (SOCs) and deployed SIEM technology as
the corner stone of their security event monitoring
programs. However, today many forward thinking
enterprises are adopting hybrid models where some
or all of these functions are outsourced to service
providers.

The Challenges of Building


and Operating a SOC

Why Outsource Security Event


Monitoring
1. Challenges in Hiring and Retaining Security
Experts
With an unprecedented shortage of qualified
cybersecurity professionals, IT organizations face the
most challenging job market in history. According to
Burning Glass Technologies, between 2010 and 2014
the number of cybersecurity job postings grew 91%
to about 238,000. Many organizations find it difficult
to attract and retain qualified security experts causing
gaps in the efficacy of their security operations.
Experts in SIEM technology are particularly
expensive to hire and retain. SIEM consultants can
backfill gaps in hiring, but they command a very high
hourly rate.
Cybersecurity experts find Managed Security Service
Providers (MSSPs) to be attractive employers
because they offer competitive salaries, opportunities
for skill enhancement, and security focused career
paths. Service providers can also locate their SOCs
close to concentrations of cybersecurity workers
an accommodation that is more difficult for other
organizations to make.

2. Threat Visibility
Cyberattacks are constantly morphing as hackers
exploit new vulnerabilities and create new variations
of malware. CryptoLocker, CryptoWall, and other
variants of ransomware are prime examples of this.
Service providers are often the first to see new
attack vectors and techniques as their customer
base encompasses organizations in many different
industries and locations. Compared to individual
enterprises, users of a managed security service may
also benefit from more sources of third party threat
intelligence feeds and advanced correlation analysis
between threat intelligence data and other suspicious
behavior. Overall, improved threat visibility increases
the chance of detecting and preventing a cyber
breach.

Copyright 2015 Proficio, Inc. All rights reserved.

3. 24x7 Vigilance

5. More Effective SOC Analyst Investigations

Advanced cyber attacks frequently originate from


Eastern Europe, China and other countries that
function outside normal US business hours. Just
blocking traffic to or from a country like Russia
does not address this issue because hackers have
anticipated this countermeasure and now launch their
attacks from US-based IP addresses under their
control.

No SIEM can provide 100% accurate alerts. Security


experts are needed to investigate suspicious alerts
to determine the criticality of a threat. In a high
performance SOC with a well-tuned SIEM, you can
expect the following:

Effective security requires around-the-clock


monitoring to detect and respond to targeted attacks
before they result in loss of data and damage
to an organizations brand. Often staffing and
managing a 24x7 SOC is beyond the resources of an
organization, but service providers can provide this
capability to their customers at a reasonable cost.

Half of all high priority actionable alerts are the


result of SOC analyst investigations
Of all the system alerts requiring analyst action,
after investigation, about half turn out to be false
positives
These data points underscore the importance of
having sufficient human security experts available
24x7.
Service providers augment the existing team of SOC
analysts and can often more effectively filter and
correlate security events to present SOC analysts
with better data. Outsourcing monitoring tasks also
improves the morale of existing employees and allows
them to focus on other priorities.

6. Rapid Response
4. Lack of SIEM Content
The underlying effectiveness of a SIEM system
is driven by the rules and use cases that detect
indicators of attack, indicators of compromise,
or policy violations. Depending on the size and
complexity of an organizations infrastructure, a fully
functioning SIEM may have hundreds of use cases.
Default use cases provided by SIEM vendors are
often outdated, ineffective and not mapped to the
specific technologies and applications used by a
SIEM user.
Building SIEM content is time consuming and
requires an in-depth understanding of the threat
landscape and the logic by which security events are
mapped to different attack vectors and vulnerabilities.
Well-tuned rules and content help increase the
productivity of SOC analysts investigations ensuring
their time is spent on the most critical events and
not chasing false positives. Service providers can
leverage the cost of developing SIEM content
across many customers and dedicate resources to
continuously develop new and customized rules and
use cases.

Responding rapidly to security incidents is as


important as the ability to detect and prioritize
security threats. Critical events require response by
senior security analysts and, if needed, remediation
actions like wiping a laptop, blocking an IP address,
or quarantining a file. Effective incident response
requires security experts to be available on a 24x7
basis, which is not always possible for even large
organizations with dedicated CSIRT teams.
Next-generation SOCs are increasingly automating
responses to critical security threats. For example,
automating blocking an IP address on a firewall after
detecting network reconnaissance from a known
malicious IP address targeting a high value asset.
Temporarily blacklisting an IP address provides IT
teams time to investigate the threat and remediate it if
necessary. At companies where operations teams are
not available outside standard business hours, this
approach is particularly useful. Building automated
response actions requires fine-tuned use cases along
with integration and testing resources.

Copyright 2015 Proficio, Inc. All rights reserved.

7. Operational Excellence

8. Time and Money

It is a truism that maintaining effective security


operations requires combining the use of people,
process, and technology. Managing these elements
is non-trivial. The Target stores data breach
exemplifies this point as their SOCs in Bangalore
and Minneapolis reportedly received priority malware
alerts, but failed to act on them.

The decision to outsource security event monitoring


is heavily influenced by the risk of operating at a
diminished level of security effectiveness. Building
a SOC and tuning a SIEM takes from months,
sometimes years, with a long list of dependencies
including hiring, training, and system integration
efforts. Service providers reduce their customers
exposure to security breaches during periods where
security operations are not operating at full speed.

Maybe their SOC analysts were swamped with


other alerts. Perhaps their runbook, which should
have described detailed processes and escalation
procedures, was not clear or updated. Service
providers that have sophisticated support systems,
trained personnel, and fine-tuned procedures
and workflow can help their customers achieve
operational excellence.

Service providers also have greater potential to


leverage economies of scale than single business
entities. This is particularly true in a 24x7 operation
where of the 1095 eight-hour shifts in a year, only 260
are during normal business hours.

About Proficio and ProSOC


Proficio is a cloud-based cyber security service provider. We combine state-of-the-art analytics with aroundthe-clock security monitoring to provide advanced threat detection and breach prevention solutions to
enterprises, healthcare providers, and government. Our services include:
Security Event Monitoring and Alerting: High-touch SOC services including 24x7 real-time security monitoring,
investigations, actionable alerts, escalations, and runbook management
SIEM-as-a-Service: Log collection, retention, analysis, alerting, advanced correlation analysis, business context
modeling, and behavioral analytics
Visibility: Provides full visibility to event logs with easy-to-use ProView web portal, powerful reporting, dashboards, and
drill down analytics
Threat Intelligence: ProSOC integrates external threat intelligence data and nefarious traffic identified within our
customers networks into our threat intelligence database
SIEM Administration: SIEM administration, operations management, patching, tuning, health and performance
monitoring, and trouble-shooting
SIEM Content Development: Development and maintenance of advanced security use cases, rules, dashboards, and
reports
Incident Response: 24x7 investigations, advice, remediation, forensic analysis, and automated response to contain high
priority threats
Compliance Reporting, Dashboards, and Workflow: PCI, HIPAA, SOX, GLBA, FFIEC, NERC CIP, FISMA, and others
Managed Security: Full security device management services including configuring, tuning and patching firewalls,
NGFWs, IDS/IPS, and WAFs
Vulnerability Management: ProSCAN (powered by QualysGuard) includes Vulnerability Scanning, Asset Discovery, and
Web Application Scanning
Security Assessment: Risk Assessments, Penetration Testing, Social Engineering, and Compliance Assessments
Proficio Headquarters:
3264 Grey Hawk Court
Carlsbad, CA 92010
+1-800-779-5042
www.proficio.com

Proficio Asia:
51 Changi Business Park
#03-11 The Signature
Singapore
+65-6996-9185

Proficio Australia and New Zealand:


264 George Street
Sydney, NSW 2000
Australia
+61(0)2-9258-1153

For a free pilot of ProSOC, please


call 1.800.779.5042 or email
prosocdemo@proficio.com

Copyright 2015 Proficio, Inc. All rights reserved. ProSOC is a registered trademark of Proficio Inc. All other
trademarks, service marks, registered marks, or registered service marks are the property of their respective
owners. Proficio assumes no responsibility for any inaccuracies in this document. Proficio reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.

S-ar putea să vă placă și